NSM-Barii / NetCrackerView external linksLinks
WiFi Hacking Suite
☆30Updated this week
Alternatives and similar repositories for NetCracker
Users that are interested in NetCracker are comparing it to the libraries listed below
Sorting:
- Convert any executable (RAT, keylogger, botnet, meterpreter, anything) into raw shellcode and run it stealthily from memory using a custo…☆30May 11, 2025Updated 9 months ago
- ☆22Oct 3, 2025Updated 4 months ago
- ☆20Aug 6, 2025Updated 6 months ago
- Capture WPA/WPA2 4-way handshake using BW16 (RTL8720dn)☆15Aug 26, 2025Updated 5 months ago
- SMS flooding tool☆22May 3, 2025Updated 9 months ago
- WiFisploit is a tool designed to scan and attack Wi-Fi networks using variety of powerful and effective attacks. It contains numerous com…☆40Jun 16, 2025Updated 7 months ago
- Export your Snapchat Memories to Apple Photos with ease☆25Dec 11, 2025Updated 2 months ago
- WiFi Hacking Tool is a powerful Python-based tool designed for ethical hacking, network analysis, and Wi-Fi penetration testing. It provi…☆13Aug 19, 2025Updated 5 months ago
- Exploit for CVE-2018-7600.. called drupalgeddon2,☆11Apr 19, 2018Updated 7 years ago
- a script for Kali Linux☆10Jun 28, 2013Updated 12 years ago
- facebook bruteforce tool☆10Dec 3, 2023Updated 2 years ago
- A tool to Disable / Enable Gatekeeper from macOS 10.15 to macOS 15☆12Jul 24, 2025Updated 6 months ago
- An open source cross-platform USB stack for embedded system☆12Sep 7, 2020Updated 5 years ago
- Restoration and modern usage of vintage IBM M 122-key a.k.a. "battlecruiser" keyboards☆10Jun 27, 2022Updated 3 years ago
- Tool for enumerate subdomains by Brute-force, or by using different options while grabbing results.☆13Sep 7, 2023Updated 2 years ago
- RHCSA Exam Preparation – Summaries & Study Notes☆19Nov 8, 2025Updated 3 months ago
- ☆20Nov 13, 2025Updated 3 months ago
- This project demonstrates how to automate preventing DeFi liquidations & optimizing interest rates on multiple blockchains using Chainlin…☆12Jul 20, 2023Updated 2 years ago
- GUI-based AI vibe coding for free with no vendor lock-in, mcp support, no need for api keys or fancy hardware, and gemini-cli for free re…☆26Aug 24, 2025Updated 5 months ago
- good looking dashboard to query your infostealer logs☆21Jan 16, 2026Updated 3 weeks ago
- Spoof the email and spams a persons inbox!☆13Jun 24, 2022Updated 3 years ago
- whisperPAIR poc☆24Feb 4, 2026Updated last week
- official airmode repository moved to github.com/parrotsec/airmode☆10Feb 8, 2016Updated 10 years ago
- ☆14Nov 20, 2021Updated 4 years ago
- Apple wireless research and tools☆19Jul 19, 2020Updated 5 years ago
- The M5Stack Cardputer Modular Expander is an extension board designed to enhance the capabilities of the M5Stack Cardputer. This expander…☆16Jan 26, 2025Updated last year
- This project has been done as the Final Year Project for Bsc Degree in Computer Networking and IT Security. It's main objective is to mon…☆17Jul 31, 2014Updated 11 years ago
- ukadoc: ukagaka documentation project☆18Updated this week
- DoS Attacks on Bluetooth Devices for pentest purposes☆32Nov 22, 2025Updated 2 months ago
- ☆43Sep 26, 2025Updated 4 months ago
- Ravage C2 - Powershell Weaponized☆41Oct 28, 2025Updated 3 months ago
- ☆19Jun 5, 2024Updated last year
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆17Oct 8, 2020Updated 5 years ago
- Aquarium created using ASCII art that runs in the terminal☆18Mar 27, 2018Updated 7 years ago
- Temporary gnu Assembly "as"☆16May 26, 2017Updated 8 years ago
- PDFs of awesome cybersecurity info☆24Jan 19, 2026Updated 3 weeks ago
- Lighter Version Of Shark - Best Tool For Phishing With Masking With Original Domain Name☆18Jan 5, 2021Updated 5 years ago
- Web of Things (WoT) Profile☆17Oct 29, 2025Updated 3 months ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆38Feb 3, 2025Updated last year